首页 > 代码库 > console
console
console接口
h3c er8300与cisco asa<H3C>? reboot Reboot device restore Restore configuration password Set administrator‘s password ip Display the IP configuration display Display current information ping Ping function admin Admin the LAN interface<H3C>dis<H3C>display sysinfo CPU and memory information device Device information version Version information<H3C>display sy<H3C>display sysinfoCPU Used Rate: 0.0%Memory Used Rate: 16.2%<H3C>dis<H3C>display dev<H3C>display device manuinfo Manufacture information<H3C>display device ma<H3C>display device manuinfo<H3C>display device manuinfoDEVICE_NAME: ER8300DEVICE_SERIAL_NUMBER: 219801A0A5M11B000064MAC_ADDRESS: C4CA-D9B6-B98FMANUFACTURING_DATE: 2011-11VENDOR_NAME: H3C<H3C>dis<H3C>display ver<H3C>display version<H3C>display versionHardware: VER.ABootrom: 1.1.1.6Software: ER8300V100R006<H3C>ip ad<H3C>ip address<H3C>ip addressThe LAN interface information: IP address: 192.168.1.1 Mask: 255.255.255.0ciscoasa> show versionCisco Adaptive Security Appliance Software Version 8.2(5)Device Manager Version 6.4(5)Compiled on Fri 20-May-11 16:00 by buildersSystem image file is "disk0:/asa825-k8.bin"Config file at boot was "startup-config"ciscoasa up 13 days 23 hoursHardware: ASA5505, 512 MB RAM, CPU Geode 500 MHzInternal ATA Compact Flash, 128MBBIOS Flash Firmware Hub @ 0xffe00000, 1024KBEncryption hardware device : Cisco ASA-5505 on-board accelerator (revision 0x0) Boot microcode : CN1000-MC-BOOT-2.00 SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03 IPSec microcode : CNlite-MC-IPSECm-MAIN-2.05 0: Int: Internal-Data0/0 : address is a493.4c3d.b49b, irq 11 1: Ext: Ethernet0/0 : address is a493.4c3d.b493, irq 255 2: Ext: Ethernet0/1 : address is a493.4c3d.b494, irq 255 3: Ext: Ethernet0/2 : address is a493.4c3d.b495, irq 255 4: Ext: Ethernet0/3 : address is a493.4c3d.b496, irq 255 5: Ext: Ethernet0/4 : address is a493.4c3d.b497, irq 255 6: Ext: Ethernet0/5 : address is a493.4c3d.b498, irq 255 7: Ext: Ethernet0/6 : address is a493.4c3d.b499, irq 255 8: Ext: Ethernet0/7 : address is a493.4c3d.b49a, irq 255 9: Int: Internal-Data0/1 : address is 0000.0003.0002, irq 25510: Int: Not used : irq 25511: Int: Not used : irq 255Licensed features for this platform:Maximum Physical Interfaces : 8VLANs : 3, DMZ RestrictedInside Hosts : 10Failover : DisabledVPN-DES : EnabledVPN-3DES-AES : DisabledSSL VPN Peers : 2Total VPN Peers : 10Dual ISPs : DisabledVLAN Trunk Ports : 0Shared License : DisabledAnyConnect for Mobile : DisabledAnyConnect for Cisco VPN Phone : DisabledAnyConnect Essentials : DisabledAdvanced Endpoint Assessment : DisabledUC Phone Proxy Sessions : 2Total UC Proxy Sessions : 2Botnet Traffic Filter : DisabledThis platform has a Base license.Serial Number: JMX1622410ARunning Activation Key: 0xf52be66f 0x38e4339e 0x3c9359c0 0x8af8f034 0x87151a98Configuration register is 0x1Configuration has not been modified since last system restart.ciscoasa>ciscoasa> show flash: all--#-- --length-- -----date/time------ path 116 15390720 May 31 2012 17:46:04 asa825-k8.bin 13 2048 May 31 2012 17:46:30 coredumpinfo 14 43 May 31 2012 17:46:30 coredumpinfo/coredump.cfg 117 16280544 May 31 2012 17:48:58 asdm-645.bin 3 2048 May 31 2012 17:53:48 log 12 2048 May 31 2012 17:54:16 crypto_archive 119 2048 Jan 01 1980 00:00:00 FSCK0000.REC 120 4096 Jan 01 1980 00:00:00 FSCK0001.REC 121 4096 Jan 01 1980 00:00:00 FSCK0002.REC 122 4096 Jan 01 1980 00:00:00 FSCK0003.REC 123 4096 Jan 01 1980 00:00:00 FSCK0004.REC 124 6144 Jan 01 1980 00:00:00 FSCK0005.REC 125 6144 Jan 01 1980 00:00:00 FSCK0006.REC 126 6144 Jan 01 1980 00:00:00 FSCK0007.REC 127 22528 Jan 01 1980 00:00:00 FSCK0008.REC 128 38912 Jan 01 1980 00:00:00 FSCK0009.REC 129 34816 Jan 01 1980 00:00:00 FSCK0010.REC 130 43008 Jan 01 1980 00:00:00 FSCK0011.REC 131 2048 Jan 01 1980 00:00:00 FSCK0012.REC 132 26624 Jan 01 1980 00:00:00 FSCK0013.REC 133 2048 Jan 01 1980 00:00:00 FSCK0014.REC 134 26624 Jan 01 1980 00:00:00 FSCK0015.REC 135 2048 Jan 01 1980 00:00:00 FSCK0016.REC128573440 bytes total (96403456 bytes free)******** Flash Card Geometry/Format Info ********COMPACT FLASH CARD GEOMETRY Number of Heads: 8 Number of Cylinders 992 Sectors per Cylinder 32 Sector Size 512 Total Sectors 253952Flash Model: UGB30SHP0128F6-ESX-1SDciscoasa> show curprivUsername : enable_1Current privilege level : 1Current Mode/s : P_UNPRciscoasa# show configuration: Saved: Written by enable_15 at 02:36:52.718 UTC Mon Sep 3 2012!ASA Version 8.2(5)!hostname ciscoasaenable password 8Ry2YjIyt7RRXU24 encryptedpasswd 2KFQnbNIdI.2KYOU encryptednames!interface Ethernet0/0!interface Ethernet0/1 switchport access vlan 2!interface Ethernet0/2!interface Ethernet0/3 shutdown!interface Ethernet0/4 shutdown!interface Ethernet0/5 shutdown!interface Ethernet0/6 shutdown!interface Ethernet0/7 shutdown!interface Vlan1 nameif inside security-level 100 ip address 192.168.1.1 255.255.255.0!interface Vlan2 nameif outside security-level 0 ip address 192.168.2.254 255.255.255.0!ftp mode passiveaccess-list 101 extended permit ip any anyaccess-list 101 extended permit tcp any anypager lines 24mtu inside 1500mtu outside 1500icmp unreachable rate-limit 1 burst-size 1no asdm history enablearp timeout 14400access-group 101 in interface outsideroute outside 0.0.0.0 0.0.0.0 192.168.2.1 1timeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolutetimeout tcp-proxy-reassembly 0:01:00timeout floating-conn 0:00:00dynamic-access-policy-record DfltAccessPolicyno snmp-server locationno snmp-server contactsnmp-server enable traps snmp authentication linkup linkdown coldstartcrypto ipsec security-association lifetime seconds 28800crypto ipsec security-association lifetime kilobytes 4608000telnet 0.0.0.0 0.0.0.0 insidetelnet 0.0.0.0 0.0.0.0 outsidetelnet 192.168.2.0 255.255.255.0 outsidetelnet timeout 5ssh timeout 5console timeout 0dhcpd address 192.168.1.10-192.168.1.41 insidedhcpd dns 221.11.1.67 221.11.1.68 interface insidedhcpd enable inside!threat-detection basic-threatthreat-detection statistics access-listno threat-detection statistics tcp-interceptusername cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15!class-map inspection_default match default-inspection-traffic!!policy-map type inspect dns preset_dns_map parameters message-length maximum client auto message-length maximum 512policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect ip-options inspect icmp!service-policy global_policy globalprompt hostname contextcall-home reporting anonymous prompt 2Cryptochecksum:a998ba915cb65ecf8729601cad068609ciscoasa#
console
声明:以上内容来自用户投稿及互联网公开渠道收集整理发布,本网站不拥有所有权,未作人工编辑处理,也不承担相关法律责任,若内容有误或涉及侵权可进行投诉: 投诉/举报 工作人员会在5个工作日内联系你,一经查实,本站将立刻删除涉嫌侵权内容。